General

  • Target

    2024-05-30_588018352a70599c989c1766d5254352_cryptolocker

  • Size

    90KB

  • MD5

    588018352a70599c989c1766d5254352

  • SHA1

    3714ee12d7eb3c6bc34b04a9377d919c08f0a20e

  • SHA256

    0c520683e40fe951fdd36938f28e1c1c20df2344b7f7b703ddf57a3c557024d2

  • SHA512

    cdfc8ce71f7811d41bc961381879fc2ed816d2489dea0bbc6006608cf3ab715037ab1ac7da475e3f0ad5a9ad8473197cb4ff76d21df422fbd3644c9398688d43

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAA/c:n6a+1SEOtEvwDpjYYvQd2Pj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_588018352a70599c989c1766d5254352_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections